Search results

Jump to navigation Jump to search

Page title matches

  • Finally the teaching of users to choose good passwords and giving negative feedback if not is essentially Instruct users to choose mnemonic passwords and use a password filter and request another
    2 KB (292 words) - 21:54, 8 November 2004

Page text matches

  • Will users compromise their passwords by using them on other systems?<br> There is a high probability and even if the users are given (unchangeable)
    640 bytes (100 words) - 22:02, 8 November 2004
  • -D "cn=Mathias Jeschke,cn=Users,dc=sar,dc=informatik,dc=hu-berlin,dc=de" \ -b "cn=Users,dc=sar,dc=informatik,dc=hu-berlin,dc=de" "(objectClass=person)"
    198 bytes (31 words) - 14:04, 12 November 2007
  • ...en 50% of the users were from the USA and 71% described themselves as home users. ...nt going on. Therefor right now it is hard to determine the real number of users and the real computating power of SETI@home.
    1 KB (156 words) - 14:43, 31 October 2005
  • ...ontents|Table of Contents]] | [[Passwords - Can Users be Trained|Next (Can Users Be Trained?)]]
    597 bytes (93 words) - 21:12, 8 November 2004
  • ...ion and Research Network). It consists of more than 1.4 million registered users (2004) and roughly 13TB of data are exchanged daily. Maze uses a simple point incentive system to prevent users from free-riding. Peers consume points by downloading and earn points by up
    1 KB (201 words) - 18:19, 26 July 2007
  • ...ey are probably not hardened to protect against malicious attacks by other users (take a look at the published vulnerabilities of Unix and Windows).
    452 bytes (66 words) - 21:05, 8 November 2004
  • Finally the teaching of users to choose good passwords and giving negative feedback if not is essentially Instruct users to choose mnemonic passwords and use a password filter and request another
    2 KB (292 words) - 21:54, 8 November 2004
  • [[Passwords - Can Users be Trained| 5.3 Can Users be Trained?]]<br>
    2 KB (229 words) - 20:52, 8 November 2004
  • 3. Will users remember the password or will they write it down because of complexity or w
    616 bytes (102 words) - 19:21, 8 November 2004
  • In a typical system, human users must authenticate themselves to
    779 bytes (109 words) - 19:09, 8 November 2004
  • ...ate the detection and discard of results of faulty processors or malicious users. A redundancy level of 2 or 3 is adequate for this. ...r work are never turned away. This increases the redundancy level the more users the project has and the higher the average speed per user gets. As the quan
    3 KB (547 words) - 14:42, 31 October 2005
  • -rw-r--r-- 1 wolfm users 7249 2005-12-01 12:47 deliver.exe -rwxr-xr-x 1 wolfm users 181 2005-12-01 13:35 filter.pl
    7 KB (1,117 words) - 10:06, 15 March 2007
  • ...upload costs, limited upload bandwidth, enviousness or egoism. Hence some users use P2P networks without sharing own resources (free-riding). ...as in e.g. the [[The Maze Peer-To-Peer System|Maze]]-network don't prevent users from cheating. Two kinds of user collusion are observed.
    4 KB (565 words) - 10:09, 30 July 2007
  • ...upload costs, limited upload bandwidth, enviousness or egoism. Hence some users use P2P networks without sharing own resources (free-riding). ...as in e.g. the [[The Maze Peer-To-Peer System|Maze]]-network don't prevent users from cheating. Two kinds of user collusion are observed.
    4 KB (567 words) - 16:31, 5 August 2007
  • ...the same system should be used to identify a user in a database of 10.000 users by simply trying the authentication on each database record in turn this wo ...n Rate (FRR) : This is the rate of authentication attempts from legitimate users that are rejected.
    6 KB (974 words) - 06:50, 23 February 2005
  • C:\Users\wolfm>openvpn --show-curves
    1 KB (177 words) - 12:27, 18 September 2018
  • ...en the table is filled up, no more connections can be allowed. Now regular users of the service won’t be able to access it. ...users, but can keep the system "alive" and thus accessible to most regular users.
    6 KB (946 words) - 19:29, 14 November 2004
  • *Allows shared access from multiple users.
    797 bytes (134 words) - 17:09, 19 November 2004
  • A community network must be usable for inexperienced end users; thus self-organization is essential. On the one hand, we are working on pr ...lenges is the insufficient scalability with increasing number of nodes and users. The most important reason for this phenomenon can be found in the structur
    3 KB (412 words) - 08:08, 18 November 2010
  • ...h sensible data. It must work ''today'' and not exclude any users. Instead users with unsafe browsers should be warned. * Client-side script to warn users with unsafe browsers
    4 KB (645 words) - 16:03, 28 September 2013
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)